Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27141: CWE-476: NULL Pointer Dereference in golang.org/x/net golang.org/x/net/http2

0
Unknown
VulnerabilityCVE-2026-27141cvecve-2026-27141cwe-476
Published: Thu Feb 26 2026 (02/26/2026, 18:50:31 UTC)
Source: CVE Database V5
Vendor/Project: golang.org/x/net
Product: golang.org/x/net/http2

Description

Due to missing nil check, sending 0x0a-0x0f HTTP/2 frames will cause a running server to panic

AI-Powered Analysis

AILast updated: 02/26/2026, 21:49:29 UTC

Technical Analysis

CVE-2026-27141 is a vulnerability identified in the golang.org/x/net/http2 package, specifically version 0.50.0, where a NULL pointer dereference occurs due to a missing nil check when processing HTTP/2 frames with frame types ranging from 0x0a to 0x0f. HTTP/2 frames are fundamental to the protocol's operation, and improper handling of these frames can cause the server to panic, resulting in a crash or denial of service. The root cause is a failure to validate that certain internal pointers are non-null before dereferencing them during frame processing. An attacker can exploit this by sending crafted HTTP/2 frames that trigger the vulnerable code path, causing the server to terminate unexpectedly. This vulnerability does not require authentication or user interaction, making it remotely exploitable. The impact is primarily on availability, as the server crash disrupts normal operations. No CVSS score has been assigned yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-476 (NULL Pointer Dereference), a common programming error leading to crashes. Since golang.org/x/net/http2 is widely used in Go-based web servers and services, this vulnerability could affect a broad range of applications until patched.

Potential Impact

The primary impact of CVE-2026-27141 is denial of service due to server crashes triggered by malformed HTTP/2 frames. Organizations running web servers or services that depend on the vulnerable golang.org/x/net/http2 version 0.50.0 may experience unexpected outages, leading to service unavailability and potential disruption of business operations. This can affect customer trust, revenue, and operational continuity. Since the vulnerability can be exploited remotely without authentication, attackers can easily cause widespread disruption. Additionally, repeated exploitation attempts could lead to resource exhaustion or complicate incident response efforts. Although the vulnerability does not directly compromise confidentiality or integrity, the availability impact alone is significant for critical infrastructure and high-availability services. The lack of known exploits in the wild suggests limited current exploitation, but the ease of triggering the issue means risk could increase rapidly once public proof-of-concept exploits emerge.

Mitigation Recommendations

To mitigate CVE-2026-27141, organizations should promptly update the golang.org/x/net/http2 package to a patched version once it is released by the maintainers. In the interim, developers can implement defensive programming techniques such as adding explicit nil checks before dereferencing pointers in the HTTP/2 frame processing code. Network-level mitigations include deploying Web Application Firewalls (WAFs) or HTTP/2-aware proxies that can detect and block malformed or suspicious HTTP/2 frames with types 0x0a to 0x0f. Rate limiting and anomaly detection on HTTP/2 traffic can reduce the risk of exploitation attempts causing denial of service. Additionally, monitoring server logs for unexpected panics or crashes related to HTTP/2 frame handling can provide early warning signs. Organizations should also review their incident response plans to quickly address potential DoS events stemming from this vulnerability. Finally, consider disabling HTTP/2 support temporarily if feasible and if the risk of exploitation outweighs the benefits of HTTP/2 performance improvements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Go
Date Reserved
2026-02-17T19:57:28.435Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a0a43885912abc71d61ab0

Added to database: 2/26/2026, 7:51:20 PM

Last enriched: 2/26/2026, 9:49:29 PM

Last updated: 2/27/2026, 2:24:49 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses